Blog Archives

Cyberlitica – 8 Ways Hackers Monetize Stolen Data

Hackers are craftier than ever, pilfering PII piecemeal so bad actors can combine data to set up schemes to defraud medical practices, steal military secrets and hijack R&D product information.
Create a Repository of the Stolen Data

Hackers start by taking an inventory of what was stolen. They will look through the stolen data files for the victim’s authentication credentials,

Read more ›

Posted in Cybersecurity, Fraud, Hacks
Tags: , , , , ,

What Keeps Hospital CIOs & CISOs Up at Night

Hospital health data has been a clear target for hackers. They’re getting smarter, and education, and buy-in from the C-suite are key prevention strategies.

Read more ›

Posted in cybergovernance, Cybersecurity, Data Security, HIPAA, Vendor Compliance
Tags: , , , , , ,

The First 100 Days – Trump and Cybersecurity

Cybergovernance: 3 Initiatives for the First 100 Days

by | Nov 14, 2016

A new administration’s priorities are often set within its first 100 days. What should the new administration do to help the country achieve greater levels of cyber maturity and risk mitigation?

Read more ›

Posted in Cyberattack, Cybersecurity, Encryption, Governance, Legal, Privacy, ransomware, Regulatory, Risk Management
Tags: , , , , , , , , , , ,

Hacking and the Small Business

Can Your Small Business Afford to Be Hacked?

By Published August 24, 2016 Small Busines

Most large companies are able to financially survive a cyberattack. But for a small business with fewer employees and less revenue,

Read more ›

Posted in cyber risk, Cybersecurity, Hacks, Risk Management
Tags: , , , , , ,

Cybernance and Cybergovernance in the Enterprise

3 Ways to Cybernance Your Enterprise
What does it actually mean to manage and oversee cyber risk using a comprehensive cybergovernance framework?

by | Jul 18, 2016 | Cybergovernance Journal

In a recent customer conversation,

Read more ›

Posted in cybergovernance
Tags: , , , , , , , ,

Ransomware Explained

Ransomware seems to be everywhere right now.

Read more ›

Posted in Malware, Ransomware, Risk Management
Tags: , , , , , , , ,

Ransomware – A Clear and Present Danger

Ransomware has risen to the top of the malware pile. Here’s a look at how this has happened.

Ransomware seems to be everywhere right now.

Read more ›

Posted in Data Security, Malware, Ransomware
Tags: , , , , , ,

Ransomware and TeamViewer – No Link?

The Spread of Ransomware Not the Result of  TeamViewer Breach?

Axel Schmidt, Public Relations Manager at TeamViewer, has contacted The SMLR Group to clarify several reports linking the spread of ransomware to a TeamViewer account:

In the last couple of days, some reports surfaced which linked some ransomware infections with TeamViewer. 

Read more ›

Posted in Content, cybergovernance, Cybersecurity, Data Security, Hacks, Incident Response, Malware, Multi-Factor Authentication, Vendor Compliance
Tags: , , , , , , , , , ,

Cyber Risk – Part 2

Size and Shape of Cyber Risk – Part 2

by | Mar 14, 2016 | for Cybergovernance Journal

In the first part of this series we explored the composition of “risk”: 1) the probability of a certain event,

Read more ›

Posted in Breach, Compliance, cyber risk, cybergovernance, Cybersecurity, Risk Management
Tags: , , , , , ,

Cybercrime Impacts Retail Security

Retail Security: Cyber Tech Fuels Cybercrime

By Matt Pillar, senior executive editor, Innovative Retail Technologies

March 2016 Innovative Retail Technologies

In a post-EMV world, retail security experts are bracing for malice, menace, and misfortune to go digital.

Read more ›

Posted in attack surface, Compliance, Content, Customer Engagement, Cyberattack, Cybersecurity, Data Security, Fraud, Hacks, Incident Response, Layered Defense
Tags: , , , , , , ,

Visit Us On TwitterVisit Us On FacebookVisit Us On LinkedinVisit Us On Google Plus

Keep Current with What’s New in Cybersecurity

Email Address:


Cybersecurity News Daily

Provides a daily summary of what's news in Cybersecurity




Get every new post delivered to your Inbox

Join other followers: